Your gateway to all our best protection. Access our best apps, features and technologies under just one account. Get antivirus, anti-ransomware, privacy tools, data leak detection, home Wi-Fi monitoring and more.

Mobile banking Trojans, explained

1. Why do I need to read this?

This article will help you to protect the money in your bank account.

2. Mobile banking Trojans — what are they?

Every smartphone is a compact computer equipped with its own operating system and software, and so, just like PCs, smartphones are targeted by malware. Mobile banking Trojans are one of the most dangerous species in the malware world: They steal money from mobile users’ bank accounts.

3. Who is at risk?

People who own gadgets and use banking apps or buy something using application stores or in-app purchases. Android users run the highest risk of being attacked by mobile banking Trojans: 98% of them are designed for this ubiquitous OS.

Throughout 2016 mobile banking Trojans actively attacked users from Russia, Germany, and Australia. Other countries in the top 10 are South Korea, Uzbekistan, China, Ukraine, Denmark, Kyrgyzstan, and Turkey.

4. Are they really that dangerous?

This type of Trojans is one of the most significant threats of the decade. In 2016 alone, we detected more than 77,000 samples of mobile banking installers. This threat shows no sign of fading away any time soon.

6. Are you kidding? Even Google Play isn’t safe?

Unfortunately, it isn’t entirely safe. Although the Play Store employs a series of protections, it cannot repel 100% of all threats. Android users are frequently tricked into downloading malicious apps posing as legitimate ones. Such malicious apps include mobile banking Trojans — for example, the notorious Acecard.

7. I have an iPhone, so I don’t have to worry, right?

Yes and no. To date, we have not heard of any case of an iPhone being infected with a banking Trojan, but malicious apps have managed to infiltrate the App Store on various occasions. For example, some six months ago, the XcodeGhost Trojan infected more than 40 legitimate iOS apps, including the very popular Chinese messaging app WeChat.

iPhone owners should keep their eyes open. Apple doesn’t allow antivirus apps in iOS, so once there is a working Trojan for iOS, users will face the threat on their own.

However, if your iPhone is jailbroken, you are at much heavier risk. Jailbreaking means basically destroying all the protection that Apple has built for its operating system, so it’s much easier for cybercriminals to infect a jailbroken device.

8. How exactly do they steal the money?

Usually it works like that. Once the banking app is launched, the Trojan displays its own interface overlaying the banking app’s interface. As a user inputs credentials, the malware steals the information.

Be especially careful with apps that request permission for access to SMS

To fool the user, a mobile banking Trojan must be able to impersonate a banking app convincingly. The most effective Trojans can impersonate dozens of banking apps, payment services, and even instant messaging apps.

There is one critical stage in the process of stealing money — hijacking SMS with one-time passwords sent by the bank’s system as part of two-factor authentication. That’s why mobile banking malware needs permission to access SMS, and that’s why you need to be extremely cautious with all apps that request such permission.

Mobile Trojans can steal money either in small portions over months or at once.

9. How can I tell if my smartphone is infected?

The most obvious sign is losing money. Comb through your bank transactions regularly. If you see no suspicious transactions but would like to check your phone anyway, use the free Kaspersky Antivirus & Security for Android to scan your device.

10. Which Trojans are the most dangerous?

OpFake is a very industrious Trojan that mimics the interfaces of almost 100 banking and finance apps. The Acecard family is also very strong: able to impersonate more than 30 banking apps or overlay any app’s interface on command. In 2016, the Asacub, Svpeng, and Faketoken Trojans swarmed Russia.

Sign up to receive our headlines in your inbox

*

*

I agree to provide my email address to “AO Kaspersky Lab” to receive information about new posts on the site. I understand that I can withdraw this consent at any time via e-mail by clicking the “unsubscribe” link that I find at the bottom of any e-mail sent to me for the purposes mentioned above.